| /linux/tools/perf/tests/ |
| H A D | util.c | 27 u8 *digests; in test_sha1() local 39 digests = malloc(digests_size); in test_sha1() 40 TEST_ASSERT_VAL("failed to allocate digests", digests != NULL); in test_sha1() 48 sha1(data, i, &digests[i * SHA1_DIGEST_SIZE]); in test_sha1() 51 sha1(digests, digests_size, digest_of_digests); in test_sha1() 53 free(digests); in test_sha1()
|
| /linux/security/integrity/ima/ |
| H A D | ima_template.c | 361 struct tpm_digest *digests; in ima_restore_template_data() local 370 digests = kcalloc(NR_BANKS(ima_tpm_chip) + ima_extra_slots, in ima_restore_template_data() 371 sizeof(*digests), GFP_NOFS); in ima_restore_template_data() 372 if (!digests) { in ima_restore_template_data() 377 (*entry)->digests = digests; in ima_restore_template_data() 384 kfree((*entry)->digests); in ima_restore_template_data()
|
| H A D | ima_crypto.c | 617 rc = crypto_shash_final(shash, entry->digests[tfm_idx].digest); in ima_calc_field_array_hash_tfm() 632 entry->digests[ima_sha1_idx].alg_id = TPM_ALG_SHA1; in ima_calc_field_array_hash() 640 entry->digests[i].alg_id = alg_id; in ima_calc_field_array_hash() 645 memcpy(entry->digests[i].digest, in ima_calc_field_array_hash() 646 entry->digests[ima_sha1_idx].digest, in ima_calc_field_array_hash()
|
| H A D | ima_fs.c | 163 ima_putc(m, e->digests[algo_idx].digest, hash_digest_size[algo]); in ima_measurements_show() 255 ima_print_digest(m, e->digests[algo_idx].digest, hash_digest_size[algo]); in ima_ascii_measurements_show()
|
| H A D | ima.h | 49 /* bitset of digests algorithms allowed in the setxattr hook */ 108 struct tpm_digest *digests; member
|
| H A D | Kconfig | 72 template permits both larger hash digests and longer
|
| /linux/drivers/char/tpm/ |
| H A D | tpm-interface.c | 373 struct tpm_digest *digests) in tpm_pcr_extend() argument 386 if (digests[i].alg_id != chip->allocated_banks[i].alg_id) { in tpm_pcr_extend() 393 rc = tpm2_pcr_extend(chip, pcr_idx, digests); in tpm_pcr_extend() 397 rc = tpm1_pcr_extend(chip, pcr_idx, digests[0].digest, in tpm_pcr_extend()
|
| H A D | tpm2-cmd.c | 185 struct tpm_digest *digests) in tpm2_pcr_extend() argument 219 tpm_buf_append_u16(&buf, digests[i].alg_id); in tpm2_pcr_extend() 220 tpm_buf_append(&buf, (const unsigned char *)&digests[i].digest, in tpm2_pcr_extend()
|
| H A D | tpm.h | 293 struct tpm_digest *digests);
|
| /linux/net/sunrpc/ |
| H A D | Kconfig | 47 SHA-1 digests. These include aes128-cts-hmac-sha1-96 and 58 that utilize Camellia ciphers (RFC 3713) and CMAC digests 72 SHA-2 digests. These include aes128-cts-hmac-sha256-128 and
|
| /linux/Documentation/scsi/ |
| H A D | cxgb3i.rst | 33 from the host driver, computes and inserts the digests, decomposes 40 the digests, then forwarding the header to the host. The payload data,
|
| /linux/include/linux/ |
| H A D | tpm.h | 476 struct tpm_digest *digests); 503 struct tpm_digest *digests) in tpm_pcr_extend() argument
|
| /linux/Documentation/crypto/ |
| H A D | sha3.rst | 41 The following functions compute SHA-3 digests::
|
| H A D | userspace-if.rst | 115 The salg_type value "hash" applies to message digests and keyed message 116 digests. Though, a keyed message digest is referenced by the appropriate 378 - the hash cipher type (keyed message digests)
|
| /linux/Documentation/ABI/testing/ |
| H A D | ima_policy | 166 Example of a 'measure' rule requiring fs-verity's digests
|
| /linux/Documentation/admin-guide/device-mapper/ |
| H A D | verity.rst | 24 The salt is appended when hashing, digests are stored continuously and
|
| /linux/Documentation/filesystems/ |
| H A D | fsverity.rst | 84 file digests as an alternative to its traditional full file digests. 386 compute fs-verity file digests itself, e.g. in order to sign files.
|
| /linux/crypto/ |
| H A D | Kconfig | 879 menu "Hashes, digests, and MACs" 888 BLAKE2b is optimized for 64-bit platforms and can produce digests
|
| /linux/drivers/md/ |
| H A D | Kconfig | 558 You'll need to activate the digests you're going to use in the
|
| /linux/drivers/crypto/ |
| H A D | Kconfig | 201 Select this option if you want to use the phmac digests
|
| /linux/Documentation/admin-guide/LSM/ |
| H A D | ipe.rst | 689 enabled files, identified via their fsverity digests.
|